Job Description:
At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day.
Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being a diverse and inclusive workplace, attracting and developing exceptional talent, supporting our teammates’ physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve.
At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us!
Job Description:
The Global Information Security (GIS) Cyber Crime Defense team investigates and engages external digital threats that impact the bank’s interests. This includes identifying, investigating, and remediating cybersecurity threats. This role would help lead the Protective Intelligence (PI) team in intelligence gathering, manual scanning for cyber threats, managing vendor relationships, performing takedowns, and creating detailed, executive-level reporting. Additionally, the role will provide strategic white glove response functionality to executives, reacting in real-time to threats as they arise utilizing a follow-the-sun methodology.
Protective Intelligence Lead role with responsibility for helping drive collaboration, coordination, and response activities across the executive landscape. The role will support the development and implementation of cohesive security strategies that protect our executive leadership, assets, and sensitive information.
Key Responsibilities:
Support the Threat Assessment team and partner in the planning and coordination of information across Cyber Security, Corporate Security, Executive Protection functions to ensure unified intelligence-driven protection strategies.Collaborate closely with senior leadership to understand security risks and align protection strategies with organizational priorities.Support a holistic approach to threat management, balancing physical and digital security considerations.Protective Intelligence Coordination:Support the planning, coordination, and execution of protective measures for executives and key personnel.Ensure that executive protection strategies are informed by real-time intelligence, risk assessments, and situational awareness.Work closely with the Executive Protection team to ensure the safety of executives during travel, public appearances, and in-office environments.Understanding of how to apply open source intelligence (OSINT) skills to gather information and conduct analysis to create intelligence reports. Must be able to convey findings to senior executives orally or in written reports.a) Cybersecurity Collaboration:
Collaborate with Information Security teams to ensure the security of critical organizational data, intellectual property, and digital communications.Ensure cross-functional collaboration between physical and cyber security teams to mitigate emerging hybrid threats.Facilitate the integration of cybersecurity and physical security data for a unified understanding of security risks.b) Crisis Management and Incident Response:
Lead the development and implementation of crisis management plans related to cyber security incidents involving our executive team members, ensuring coordination between all involved teams.Provide leadership during high-stakes cyber security incidents and crises, ensuring a swift and coordinated response across departments.Develop and execute training programs to prepare teams for potential security events, including simulations and tabletop exercises.c) External Relationship Management:
Build and maintain relationships with law enforcement, intelligence agencies, and other relevant external stakeholders.Represent the company in industry forums, collaborating with peers to stay informed of evolving security trends and best practices.Required skills:
Demonstrated leadership skills and ability to pivot program based on strategic threat landscape analysis.Should be comfortable working with incomplete facts, be able to quickly rationalize and drive clarity, translate to actionable tasks, and demonstrate tenacity by working assigned tasks through to completion.Understanding of the process to contact hosting providers to remove domains that being used to commit fraud or conducts social engineering attacks including legal parameters and investigative mindset.Proficiency with executive-level tracking and reporting, including expertise in Jira and ExcelMust be comfortable in delivering messages to a wide spectrum of individuals having varying degrees of technical understanding.Confident and capable written and oral presentation skills, including proficiency in PowerPoint.Strong project management skillsCompleting written reports in compliance with current reporting procedures and policies.Document each stage of the investigation and maintain a focus on case logs and details.Ability to work independently with little oversight managing multiple investigations simultaneously.Ability to analyze investigations and data to find patterns and make risk based decisions to improve the processes and programMust have strong leadership skills and qualities which enable you to work with peers and various levels of management.Demonstrated vendor management skills.A broad knowledge of computer networking, log analysis, information security principles, and adversarial tools and techniquesStrong analytical skills/problem solving/conceptual thinking.Able to identify, analyze and address cyber security issues or threats, including emerging tactics or techniques.Capability to convey a cybersecurity issue or threat to an external firm in a way that demonstrates how it violates the Terms of Service or Community StandardsAbility to resolve issues with minimal negative impact and risk to the organization.Desired skills:
Bachelor's degree in Information Technology or related fieldOpen source Intelligence skills (OSINT)Experience in the remediation of information security risks/vulnerabilitiesExperience with network monitoring and intrusion detection systemsAbility to work with technical and non-technical individuals.